Oracle Database Firewall works on the network, transparent to database servers and applications, and can be quickly deployed.
Oracle Database Firewall provides a centralized management console for monitoring multiple databases simultaneously and supports parallel devices for high availability deployments. Optional host-based agents can provide low-impact local monitoring capabilities.
Prerequisites for Database Firewall Impementation
Privileges Required to Perform the Installation: Any trusted user can install Oracle Database Firewall. You do not need administrative privileges to complete the installation.
Database Firewall and Management Server Hardware Requirements:
You must install each Database Firewall and Management Server onto a Linux server, which will be used solely for Oracle Database Firewall. The requirements for each are the same. Remember that the installation process re-images the computer, so do not use a computer that is used for other activities.
Checking the System Architecture:
- Each Linux server must be Linux 32-bit.
Checking the Memory Requirements:
- Each Linux server must have at minimum 1 GB of RAM.
Checking the Disk Space:
- Each Linux server must have at minimum 80 GB of disk space.
Checking the Network Interface Cards:
- You must have a minimum of three ports for each Linux server that you will use for Database Firewall and Management Server. One network interface card (NIC) with three ports is sufficient.
Supported Database Versions:
This database (also called the protected databases) is the database that you will monitor using Oracle Database Firewall. The following database products are supported:
Oracle Database 8i, Oracle Database 9i, Oracle Database 10g, Oracle Database 11.1.x, and Oracle Database 11.2.x (including Release 11.2.0.2).
Supported Language and Character Sets:
Oracle Database Firewall is available in English only, but can support Unicode character sets.
Steps to impement Oracle Database Firewall:
Step 1: Set the Standalone Database Firewall Date and Time
Step 2: Specify the Management Server NTP Time Server
Step 3: Specify the Standalone Database Firewall Network Settings
Step 4: Enable Secure Log Access
Step 5: Configure the Standalone Database Firewall Syslog Destinations
Step 6: Configure the Standalone Database Firewall Enforcement Points
Step 7: Configure the Standalone Database Firewall Bridge IP Address
Step 8: Test the Standalone Database Firewall System Operation